Value Policies IBMWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Value Policies IBM returned the following results.
RSS What is RSS?
Related Categories

 •   Business Intelligence Solutions
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Virtualization
 •   Databases
 •   Data Security
 •   Business Process Management (BPM)
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Data Center Management
 •   Content Delivery Networks/ Web Application Acceleration

Related Searches
 •   Consulting Value Policies
 •   Downloads Value Policies IBM
 •   Email Value
 •   Monitoring Value Policies IBM
 •   Technical Value Policies
 •   Value Design
 •   Value Policies IBM Import
 •   Value Policies IBM Summary
 •   Value Policies IBM Testing
 •   Value Products
Advertisement

ALL RESULTS
1 - 25 of 493 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Realizing Business Value with Identity and Access Management by IBM

September 25, 2009 - (Free Research)
Read this white paper to learn how IBM identity and access management solutions help organizations realize business value through a centralized, automated identity and access management infrastructure. 
(WHITE PAPER) READ ABSTRACT |

The Value of PowerVM Workload Partitions: New Virtualization Options in IBM AIX v6.1 by IBM

January 16, 2009 - (Free Research)
This white paper from the Sageza Group, Inc. explains why Workload Partitions (WPARs) are a more cost-effective way to meet the needs of your organization. 
(WHITE PAPER) READ ABSTRACT |

Develop Effective User Management to Demonstrate Compliance Efforts and Achieve Business Value by IBM

December 2008 - (Free Research)
Learn how IBM solutions can help organizations support compliance efforts and business requirements through user management solutions based on IBM Tivoli Identity Manager software and other IBM offerings. 
(WHITE PAPER) READ ABSTRACT |

Manage User Identities Efficiently to Help Increase Administrator and User Productivity, While Facilitating Compliance Initiatives by IBM

January 2011 - (Free Research)
When IT resources are pulled into drawn-out identity management tasks such as service level agreements, internal policies, etc., it means less time developing high-value innovations for future agency initiatives. Read this white paper and see how IBM can help your federal agency centralize and automate your repetitive processes. 
(WHITE PAPER) READ ABSTRACT |

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)

Optim Data Growth Solution for Oracle E-Business Suite by IBM

Align continuous control of your E-Business Suite data with business objectives. Optim's proven archiving capabilities enable you to set desired service levels for each category of E-Business Suite data - for example, current data, reporting data and historical data. You maintain universal access to information. 
(SOFTWARE PRODUCT)

Smarter Application Portfolio Management Webcast by IBM

October 2010 - (Free Research)
Organizations continue to spend upwards of 70% of their technology budgets in maintaining an existing inventory of applications. some of which are redundant and some that have exceeded their useful life, and continue to consume resources without returning value. Watch this webcast to learn more. 
(WEBCAST) READ ABSTRACT |

Information Governance for Business Value by IBM

August 2013 - (Free Research)
In this expert e-guide, brought to you by searchCompliance.com, learn how incorporating IT compliance and information governance policy best practices can provide huge benefits to overall corporate strategy. 
(EGUIDE) READ ABSTRACT |

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

New Ponemon Study Reveals Disconnects in Building the Business Case for Data Protection by IBM

September 2009 - (Free Research)
In this webcast, newly released research reveals that C-level executives lack confidence in their organization's ability to safeguard sensitive data. This survey, conducted by Ponemon Institute and sponsored by Ounce Labs, an IBM Company, determines what senior executives think about the value proposition of corporate data protection efforts. 
(WEBCAST) READ ABSTRACT |

Analyst Insight: Is There a Smart City Market? by ComputerWeekly.com

May 2012 - (Free Research)
The value of the IT market for smart cities globally is approximately $35bn, according to this in depth analysis from Ovum. 
(ANALYST REPORT) READ ABSTRACT |

Presentation Transcript: Business Case for Data Protection Survey & Results by Ounce Labs, an IBM Company

October 2009 - (Free Research)
This presentation transcript presents the results of a survey conducted by Ponemon Institute and sponsored by Ounce Labs, an IBM Company. The survey determines what senior executives think about the value proposition of corporate data protection efforts. Read on to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Best practices for effective information management by IBM

September 2011 - (Free Research)
In this expert e-guide take away tips to optimize your business value of successful data management processes, manage the lifecycle of your information and create effective deployments. 
(EGUIDE) READ ABSTRACT |

Predictive Security Intelligence for Retail Organizations by Q1 Labs, an IBM Company

February 2012 - (Free Research)
This webcast explores how to add a new dimension to security intelligence through risk management. Extend the value of SIEM and Log Management to determine risk levels throughout your network by integrating vulnerability assessment scan results, network behavior analysis and topology, device configurations, policies, and compliance management. 
(WEBCAST) READ ABSTRACT |

A Practical "How-To" Guide for Creating Mobile Enterprise Programs by IBM

November 2012 - (Free Research)
This informative paper discusses practical best practices for implementing effective mobile enterprise programs that can create significant value for employees, partners, and customers. 
(WHITE PAPER) READ ABSTRACT |

Developing more effective mobile enterprise programs by IBM

February 2014 - (Free Research)
This informative paper discusses practical best practices for implementing effective mobile enterprise programs that can create significant value for employees, partners, and customers. 
(WHITE PAPER) READ ABSTRACT |

Reed & Mackay harnesses analytics to save clients’ travel costs by IBM

April 2013 - (Free Research)
View this white paper to learn more about how Reed & Mackay improved the value of their business with analytics. This successful travel company generated detailed reports for each of its clients showing the fares they paid, reductions and others cost to give examples of how the agency can assist the clients. 
(WHITE PAPER) READ ABSTRACT |

Executive Brief Digital Transformation: Creating New Business Models Where Digital Meets Physical by IBM

November 2011 - (Free Research)
As businesses embrace the digital revolution, they're rethinking what customers value most and creating operating models that take advantage of what’s newly possible for competitive differentiation. This report is designed to provide senior executives with analysis and insight on how fast and how far to go on the path to digital transformation. 
(WHITE PAPER) READ ABSTRACT |

IBM DB2 and IBM Power Systems: Transform information into insight and accomodate rising transaction volume - NEW! (Translated)  by IBM

March 2011 - (Free Research)
This paper explains how the synergy of DB2 and Power Systems can help businesses simplify deployment of Web applications, achieve cost-effective large-scale processing, construct a large-capacity messaging backbone and consolidate workloads-- all accelerating your time to value 
(WHITE PAPER) READ ABSTRACT |

Cabot Partners: Optimizing Business Value for Midsized SAP Landscapes with IBM PowerLinux: Simpler by Design by IBM

April 2012 - (Free Research)
<p>x86-based Linux platforms may seem like an affordable option for supporting SAP workloads, but ongoing maintenance costs quickly exceed the low acquisition costs of these architectures. Learn about a recommended alternative that can be integrated with virtualization and find out why it is ideally suited for your SAP environment.</p> 
(WHITE PAPER) READ ABSTRACT |

What's the value of "expert" integrated systems? by IBM

October 2012 - (Free Research)
In this informative video, hear from executives from Reflexis, an IBM ISV, as they discuss the value of IBM's family of expert integrated systems, PureSystems. 
(VIDEO) READ ABSTRACT |

Agile Decision Services: How IBM ILOG’s Business Rule Management System Helps Organizations Deliver Fast Time to Value for Business and IT by IBM

December 2010 - (Free Research)
This paper explores the challenges of trying to deliver quick time-to -value for IT projects and achieve the status of ‘agile enterprise’. It illustrates how IBM® WebSphere® ILOG BRMS can facilitate the alignment of IT with business and support the implementation of an ADS to provide business value within months of project adoption. 
(WHITE PAPER) READ ABSTRACT |

Beating web application security threats by IBM

October 2011 - (Free Research)
Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability. 
(EGUIDE) READ ABSTRACT |

IDC Europe: The Business Value of IBM Storwize and XIV Storage by IBM

June 2013 - (Free Research)
This comprehensive report deciphers the business value of IBM Storwize and XIV disk storage systems after interviewing 10 organizations that had deployed either system. 
(WHITE PAPER) READ ABSTRACT |

How to Derive Significant Business Value Through Companywide Records Management by Iron Mountain

November 2013 - (Free Research)
Consult the following white paper to uncover how to gain business value from successful, companywide records management. Learn about the risks and costs associated with inconsistent RIM and what you can do to prevent it. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 493 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts